What Information Is Leaked under Concurrent Composition?
From MaRDI portal
Publication:2849398
DOI10.1007/978-3-642-40084-1_13zbMath1316.94075OpenAlexW2205521245MaRDI QIDQ2849398
Divya Gupta, Abhishek Jain, Vipul Goyal
Publication date: 17 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_13
Related Items (4)
Concurrent Secure Computation via Non-Black Box Simulation ⋮ Concurrent Secure Computation with Optimal Query Complexity ⋮ Concurrently Composable Security with Shielded Super-Polynomial Simulators ⋮ Magic Adversaries Versus Individual Reduction: Science Wins Either Way
This page was built for publication: What Information Is Leaked under Concurrent Composition?